- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- How to keep your smartphone (and its data) secure
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Today's Approach to Security is Broken
- Microsoft confirms HTTP Strict Transport Security for IE 12
The Washington Post and the U.S. edition of the Guardian newspaper have each won a public service Pulitzer Prize for reporting on the leaks by Edward Snowden that revealed the extent of surveillance on ordinary citizens.
There are no more lifelines. In a few days, Microsoft will pull the plug on Windows XP support for consumers. With no more updates or security patches available (other than some bare-bones malware support), it's forecast to be open season on the legacy operating system. But just how bad will the "Windows XPocalypse" be? We spoke to several security experts to find out.
It may not be a revelation that security isn't a top priority for many organizations, but what about those companies that want to have a full-time CISO and simply cannot afford it? Enter the CISO "in residence" program in Howard County, Maryland.
Palo Alto Networks, known for its next-generation firewall, Monday said it is buying Israeli start-up Cyvera for about $200 million to gain access to its endpoint security product for real-time attack prevention. The deal is expected to close in a few weeks.
Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting a board member in charge while the security vendor searches for a permanent replacement
Computerworld Hong Kong took an in-depth look at the top ten events that shook the local and global IT world in 2013.
As 2012 draws to a close, Ericsson ConsumerLab has identified the hottest consumer trends for 2013 and beyond. For more than 15 years, ConsumerLab has conducted research into people's values, behavior and ways of using ICT products and services.
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
Studies show that employees are engaging in rogue use of the cloud, even when IT organizations say they have clear formal cloud policies and penalties for violation of the policies.
Sign up now »
The lightest, fastest, easiest-to-manage, and most effective endpoint protection.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.